首页 > 最新文献

2015 International Conference on Communication Networks (ICCN)最新文献

英文 中文
Association rules optimization using improved PSO algorithm 基于改进粒子群算法的关联规则优化
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.76
Mayank Agrawal, Manuj Mishra, S. Kushwah
In this work, association rules are optimized by using improved particle swarm optimization algorithm (PSO Algorithm). Here improved PSO algorithm means classical PSO algorithm with additional operator in the forms of mutation of genetic algorithm. The basic shortcoming of PSO algorithm is to get trapped into local optima. So for improving this, mutation operator is used additionally in classical PSO algorithm. This operator is used after the initialization phase of PSO algorithm. Firstly, different association rules for generating frequent item sets are generated by standard Apriori algorithm, then improved PSO algorithm is applied on these generated association rules for optimizing them. Experiments are performed on different datasets taken from UCI machine learning repository and results are compared with other previously proposed algorithms, called KNN algorithm and ABC algorithm. These results show that the proposed algorithms efficiency is better than previously proposed algorithms.
本文采用改进的粒子群优化算法(PSO算法)对关联规则进行优化。这里的改进粒子群算法是指经典粒子群算法在遗传算法的变异形式下加上附加算子。粒子群算法的基本缺点是陷入局部最优。为了改进这一点,在经典粒子群算法中增加了变异算子。该算子在粒子群算法初始化阶段之后使用。首先利用标准Apriori算法生成不同的频繁项集生成关联规则,然后利用改进的粒子群算法对生成的关联规则进行优化。在UCI机器学习存储库的不同数据集上进行了实验,并将实验结果与其他先前提出的算法(称为KNN算法和ABC算法)进行了比较。实验结果表明,该算法的效率优于已有算法。
{"title":"Association rules optimization using improved PSO algorithm","authors":"Mayank Agrawal, Manuj Mishra, S. Kushwah","doi":"10.1109/ICCN.2015.76","DOIUrl":"https://doi.org/10.1109/ICCN.2015.76","url":null,"abstract":"In this work, association rules are optimized by using improved particle swarm optimization algorithm (PSO Algorithm). Here improved PSO algorithm means classical PSO algorithm with additional operator in the forms of mutation of genetic algorithm. The basic shortcoming of PSO algorithm is to get trapped into local optima. So for improving this, mutation operator is used additionally in classical PSO algorithm. This operator is used after the initialization phase of PSO algorithm. Firstly, different association rules for generating frequent item sets are generated by standard Apriori algorithm, then improved PSO algorithm is applied on these generated association rules for optimizing them. Experiments are performed on different datasets taken from UCI machine learning repository and results are compared with other previously proposed algorithms, called KNN algorithm and ABC algorithm. These results show that the proposed algorithms efficiency is better than previously proposed algorithms.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhanced multipath LEACH protocol for increasing network life time and minimizing overhead in MANET 增强的多路径LEACH协议,用于增加网络寿命和最小化MANET的开销
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.30
Priyanka Shakya, V. Sharma, Anil Saroliya
Energy utilization is one of the important issues in MANET, efficient routing is necessary to utilize energy consumption and enhance the network performance. A mobile Ad hoc network (MANET) is autonomous, self-organizing and self-configuring network with the capability of rapid deployment in response to application needs. LEACH is an energy based protocol which works on the cluster base mechanism to utilize the energy consumption. The cluster formation is completely depends on the remaining energy of mobile nodes. The cluster has always having more energy than cluster members. In this paper we analyses the performance of LEACH protocol with reactive on demand multipath AOMDV protocol to efficiently utilize the energy constraint in network. Here proposed scheme are not compare with any previous existing scheme. The performance of proposed MAX energy based LEACH-AOMDV is compared with normal LEACH-AOMDV routing and observes that the energy utilization is more in proposed LEACH. In Our experiments show that nodes have at best imprecise state information, especially under high traffic rates. LEACH generates cluster and gives information about energy of each cluster belonging to zone and if energy of the node is higher so LEACH selects that particular node for data transmission that increases the reliable communication. In this paper we also analyse the result in the form of network parameter like throughput, packet delivery ratio, energy consumption via node and routing overhead.
能量利用是MANET的重要问题之一,有效的路由是利用能量消耗和提高网络性能的必要条件。移动自组网(MANET)是一种自治、自组织、自配置的网络,具有响应应用需求的快速部署能力。LEACH是一种基于能量的协议,它基于集群基础机制来利用能量消耗。星团的形成完全取决于移动节点的剩余能量。星团总是比星团成员拥有更多的能量。本文分析了LEACH协议与无功按需多径AOMDV协议的性能,以有效地利用网络中的能量约束。本文提出的方案不与以往任何方案进行比较。将基于最大能量的LEACH- aomdv路由与普通LEACH- aomdv路由的性能进行了比较,发现该LEACH路由的能量利用率更高。在我们的实验中表明,节点在最好的情况下具有不精确的状态信息,特别是在高流量下。LEACH生成集群,并给出属于zone的每个集群的能量信息,如果节点的能量更高,LEACH将选择特定的节点进行数据传输,从而增加了通信的可靠性。本文还以吞吐量、分组传送率、节点能耗和路由开销等网络参数的形式对结果进行了分析。
{"title":"Enhanced multipath LEACH protocol for increasing network life time and minimizing overhead in MANET","authors":"Priyanka Shakya, V. Sharma, Anil Saroliya","doi":"10.1109/ICCN.2015.30","DOIUrl":"https://doi.org/10.1109/ICCN.2015.30","url":null,"abstract":"Energy utilization is one of the important issues in MANET, efficient routing is necessary to utilize energy consumption and enhance the network performance. A mobile Ad hoc network (MANET) is autonomous, self-organizing and self-configuring network with the capability of rapid deployment in response to application needs. LEACH is an energy based protocol which works on the cluster base mechanism to utilize the energy consumption. The cluster formation is completely depends on the remaining energy of mobile nodes. The cluster has always having more energy than cluster members. In this paper we analyses the performance of LEACH protocol with reactive on demand multipath AOMDV protocol to efficiently utilize the energy constraint in network. Here proposed scheme are not compare with any previous existing scheme. The performance of proposed MAX energy based LEACH-AOMDV is compared with normal LEACH-AOMDV routing and observes that the energy utilization is more in proposed LEACH. In Our experiments show that nodes have at best imprecise state information, especially under high traffic rates. LEACH generates cluster and gives information about energy of each cluster belonging to zone and if energy of the node is higher so LEACH selects that particular node for data transmission that increases the reliable communication. In this paper we also analyse the result in the form of network parameter like throughput, packet delivery ratio, energy consumption via node and routing overhead.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116674867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modified region based segmentation of medical images 改进的基于区域的医学图像分割方法
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.41
R. Kashyap, Pratima Gautam
Health care applications became boon for the healthcare industry. It needs correct segmentation connected with medical images regarding correct diagnosis. This assures good quality segmentation of healthcare images victimization. The Level set method (LSM) can be a capable technique however quick process employing correct segments is still difficult. The region based model does inadequately for intensity irregularity images. With this cardstock, we have a whole new tendency to propose a better region based level set method of which integrates the altered signed pressure function because of the geodesic active contour models plus the Mumford-Shah model. So as to eliminate the re-initialization procedure for ancient level set model and removes the computationally costly re-initialization. A compared employing ancient model, our model is more durable against images employing weak edge and intensity irregularity. The novelty within our method is to help you locally compute improved Signed pressure function (SPF), which uses neighborhood mean values which enables it to detect boundaries within the homogenous places. Compared with other active design models proposed method derives valuable advantages not stuck just using quick process, automation and correct medical image segments. This method offers undergone numerous analysis tests to prove its importance in medical image segmentation.
医疗保健应用成为医疗保健行业的福音。为了正确诊断,需要对医学图像进行正确的分割。这保证了医疗保健图像受害的高质量分割。水平集方法(LSM)是一种有效的方法,但采用正确的分段进行快速处理仍然很困难。基于区域的模型不能很好地处理强度不规则图像。有了这张卡片,我们有了一个全新的趋势,提出了一个更好的基于区域的水平集方法,其中集成了由于测地线活动轮廓模型和Mumford-Shah模型而改变的带符号压力函数。从而消除了旧水平集模型的重新初始化过程,消除了计算量大的重新初始化。与传统模型相比,该模型对边缘较弱、强度不规则的图像具有较强的耐受性。我们方法的新颖之处在于帮助您在本地计算改进的有符号压力函数(SPF),它使用邻域平均值,使其能够检测同质位置内的边界。与其他主动设计模型相比,该方法具有流程快、自动化程度高、图像分割准确等优点。该方法经过了大量的分析测试,证明了其在医学图像分割中的重要性。
{"title":"Modified region based segmentation of medical images","authors":"R. Kashyap, Pratima Gautam","doi":"10.1109/ICCN.2015.41","DOIUrl":"https://doi.org/10.1109/ICCN.2015.41","url":null,"abstract":"Health care applications became boon for the healthcare industry. It needs correct segmentation connected with medical images regarding correct diagnosis. This assures good quality segmentation of healthcare images victimization. The Level set method (LSM) can be a capable technique however quick process employing correct segments is still difficult. The region based model does inadequately for intensity irregularity images. With this cardstock, we have a whole new tendency to propose a better region based level set method of which integrates the altered signed pressure function because of the geodesic active contour models plus the Mumford-Shah model. So as to eliminate the re-initialization procedure for ancient level set model and removes the computationally costly re-initialization. A compared employing ancient model, our model is more durable against images employing weak edge and intensity irregularity. The novelty within our method is to help you locally compute improved Signed pressure function (SPF), which uses neighborhood mean values which enables it to detect boundaries within the homogenous places. Compared with other active design models proposed method derives valuable advantages not stuck just using quick process, automation and correct medical image segments. This method offers undergone numerous analysis tests to prove its importance in medical image segmentation.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127736064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Robust FinFET based highly noise immune power gated SRAM circuit design 基于鲁棒FinFET的高抗噪功率门控SRAM电路设计
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.59
N. Bhardwaj, V. Mahor, M. Pattanaik
Leakage power dissipation, timing delay and high noise immunity in advanced embedded static random access memories cells are main critical issues in low power battery operated devices. The newly proposed FinFET based highly noise immune Power gated 6T SRAM design is targeting these areas and successfully suppress leakage power dissipation with maintaining stability of data in standby mode. A single ended read and write assist circuitry is also presented to here, which enhancing read and write noise margin for maintaining robustness of SRAM stability. As compared with conventional FinFET SRAM designs in the proposed design, the power dissipation in SLEEP mode is reduced up to 86.8% and, read and write power consumption are up to 98.9% and 16.5%, respectively. The noise margin of proposed design is increased up to 45× as compared to self-reverse biased power gated SRAM at 32nm technology node.
先进嵌入式静态随机存取存储单元的漏功耗、时序延迟和高抗噪性是低功率电池供电器件的关键问题。新提出的基于FinFET的高抗噪声功率门控6T SRAM设计针对这些领域,并成功地抑制泄漏功耗,同时保持待机模式下数据的稳定性。本文还提出了一种单端读写辅助电路,提高了读写噪声裕度,保持了SRAM的鲁棒性稳定性。与传统的FinFET SRAM设计相比,该设计在SLEEP模式下的功耗降低了86.8%,读写功耗分别降低了98.9%和16.5%。与32nm工艺节点的自反向偏置功率门控SRAM相比,该设计的噪声余量提高了45倍。
{"title":"Robust FinFET based highly noise immune power gated SRAM circuit design","authors":"N. Bhardwaj, V. Mahor, M. Pattanaik","doi":"10.1109/ICCN.2015.59","DOIUrl":"https://doi.org/10.1109/ICCN.2015.59","url":null,"abstract":"Leakage power dissipation, timing delay and high noise immunity in advanced embedded static random access memories cells are main critical issues in low power battery operated devices. The newly proposed FinFET based highly noise immune Power gated 6T SRAM design is targeting these areas and successfully suppress leakage power dissipation with maintaining stability of data in standby mode. A single ended read and write assist circuitry is also presented to here, which enhancing read and write noise margin for maintaining robustness of SRAM stability. As compared with conventional FinFET SRAM designs in the proposed design, the power dissipation in SLEEP mode is reduced up to 86.8% and, read and write power consumption are up to 98.9% and 16.5%, respectively. The noise margin of proposed design is increased up to 45× as compared to self-reverse biased power gated SRAM at 32nm technology node.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131852714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Geo-location method for lost node in location based services 基于地理位置的服务中丢失节点的地理定位方法
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.68
Brinda Shivhare, Gaurav Sharma, R. S. Kushwah, S. Kushwah
The “geo-location” or “location-based services” is an authentication driven system that gives a strong layer in field of lost node localization and that limits the access of information content to specified locations or times with respective to lost node. Yet, the difficulty arises with the GPS related services makes it impractical to incorporate GPS in all the mobile nodes (MN) and subject to availability of GPS signals. The physical location of a particular user or network node at any instant in time is uniquely characterized by a location signature with trace its exact location. These location signature obtain from location node, where several analyst have described how the use of location information can make approach more secured. According to our empirical study the approach can meet the confidentiality, substantiate, clarity, accessibility and practicability of localization of lost node issues in Geo-location authentication systems.
“地理定位”或“基于位置的服务”是一种身份验证驱动的系统,它在丢失节点定位领域提供了一个强大的层次,并将信息内容的访问限制在相应的丢失节点的指定位置或时间。然而,GPS相关服务带来的困难使得在所有移动节点(MN)中合并GPS并且受GPS信号可用性的限制是不切实际的。特定用户或网络节点在任何时刻的物理位置都是由位置签名唯一表征的,可以跟踪其确切位置。这些位置签名从位置节点获得,一些分析人员已经描述了位置信息的使用如何使方法更加安全。实证研究表明,该方法能够满足地理位置认证系统中丢失节点问题定位的保密性、实证性、清晰度、可及性和实用性。
{"title":"Using Geo-location method for lost node in location based services","authors":"Brinda Shivhare, Gaurav Sharma, R. S. Kushwah, S. Kushwah","doi":"10.1109/ICCN.2015.68","DOIUrl":"https://doi.org/10.1109/ICCN.2015.68","url":null,"abstract":"The “geo-location” or “location-based services” is an authentication driven system that gives a strong layer in field of lost node localization and that limits the access of information content to specified locations or times with respective to lost node. Yet, the difficulty arises with the GPS related services makes it impractical to incorporate GPS in all the mobile nodes (MN) and subject to availability of GPS signals. The physical location of a particular user or network node at any instant in time is uniquely characterized by a location signature with trace its exact location. These location signature obtain from location node, where several analyst have described how the use of location information can make approach more secured. According to our empirical study the approach can meet the confidentiality, substantiate, clarity, accessibility and practicability of localization of lost node issues in Geo-location authentication systems.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117243045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey: Lightweight cryptography in WSN 无线传感器网络中的轻量级加密技术综述
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.3
S. T. Patel, N. Mistry
A Wireless Sensor Network (WSN) is a wireless network which contains small sensor nodes to monitor physical or environmental conditions. When WSNs are deployed in inaccessible areas, the probability of occurring different types of attacks is very high. So the security of WSN becomes extremely important. As sensors have limited processing power, limited storage, low bandwidth, and energy; traditional security measures designed for the resource-rich networks such as LAN etc. are not suitable for the resource-constrained WSN. In presence of such limitations it becomes mandatory to devise lightweight security solutions for data transmission in WSNs. Because of problems in public key cryptography such as costly key computation, longer keys, key vulnerability to brute force attack, key distribution and maintenance, etc., it is not preferred for WSN. The less computation and low memory requirements of symmetric key cryptography with very short length of key (lightweight) justifies its use in WSN to achieve information security. Hence, this paper aims to study, discuss and analyze the Lightweight Cryptographic Algorithms Suitable for Wireless Sensor Networks.
无线传感器网络(WSN)是一种包含小型传感器节点的无线网络,用于监测物理或环境状况。当无线传感器网络部署在不可访问的区域时,发生不同类型攻击的概率非常高。因此,无线传感器网络的安全性变得尤为重要。由于传感器具有有限的处理能力、有限的存储、低带宽和能量;传统的针对局域网等资源丰富的网络设计的安全措施不适用于资源受限的无线传感器网络。由于存在这些限制,必须为无线传感器网络中的数据传输设计轻量级安全解决方案。由于公钥加密存在密钥计算成本高、密钥较长、密钥容易被暴力破解、密钥分发和维护等问题,因此不适合无线传感器网络。极短密钥长度(轻量级)的对称密钥加密具有计算量小、内存需求低的特点,因此适合应用于无线传感器网络,以实现信息安全。因此,本文旨在研究、讨论和分析适用于无线传感器网络的轻量级加密算法。
{"title":"A survey: Lightweight cryptography in WSN","authors":"S. T. Patel, N. Mistry","doi":"10.1109/ICCN.2015.3","DOIUrl":"https://doi.org/10.1109/ICCN.2015.3","url":null,"abstract":"A Wireless Sensor Network (WSN) is a wireless network which contains small sensor nodes to monitor physical or environmental conditions. When WSNs are deployed in inaccessible areas, the probability of occurring different types of attacks is very high. So the security of WSN becomes extremely important. As sensors have limited processing power, limited storage, low bandwidth, and energy; traditional security measures designed for the resource-rich networks such as LAN etc. are not suitable for the resource-constrained WSN. In presence of such limitations it becomes mandatory to devise lightweight security solutions for data transmission in WSNs. Because of problems in public key cryptography such as costly key computation, longer keys, key vulnerability to brute force attack, key distribution and maintenance, etc., it is not preferred for WSN. The less computation and low memory requirements of symmetric key cryptography with very short length of key (lightweight) justifies its use in WSN to achieve information security. Hence, this paper aims to study, discuss and analyze the Lightweight Cryptographic Algorithms Suitable for Wireless Sensor Networks.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125163106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimization of cooperative spectrum sensing in cognitive radio for mobile communication 移动通信认知无线电协同频谱感知优化
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.46
Divyesh R. Keraliya, Ashalata Kulshrestha, S. Patel
Cognitive radio technology offers a revolutionary solution to spectral resources crisis by looking at the spectrum in an unconventional manner as a multi-dimensional space. The current wireless communication systems are governed by fixed spectrum assignment policy (licensed spectrum), which was proven by measurement to be inefficient. Cognitive radio enables maximum spectrum utilization efficiency through opportunistic access to temporarily unutilized portions of spectrum. In Cognitive Radio spectrum sensing performance is more important. By cooperative spectrum sensing probability of false alarm (Pf) is increased with given probability of detection (Pd). In this paper we formulate a cooperative spectrum sensing as noncooperative game and also formulate a optimization problem, numerical results demonstrate that limited number of SU for cooperative sensing are achieve much better performance than Nash Equilibrium. By selecting optimal strategy SU maximize their utility, maximum spectrum utilization is depend on expected utility under different SNR.
认知无线电技术以一种非常规的方式将频谱视为一个多维空间,为频谱资源危机提供了革命性的解决方案。目前的无线通信系统采用固定频谱分配策略(即许可频谱)进行管理,实践证明该策略效率低下。认知无线电通过机会访问暂时未利用的频谱部分,实现频谱利用效率的最大化。在认知无线电中,频谱感知性能更为重要。通过协同频谱感知,在给定检测概率(Pd)的基础上,提高了虚警概率(Pf)。本文将合作频谱感知作为一种非合作博弈,并提出了一个优化问题,数值结果表明,有限数量的SU对合作频谱感知具有比纳什均衡更好的性能。在不同信噪比下,通过选择最优策略使频谱利用率最大化,最大频谱利用率取决于期望效用。
{"title":"Optimization of cooperative spectrum sensing in cognitive radio for mobile communication","authors":"Divyesh R. Keraliya, Ashalata Kulshrestha, S. Patel","doi":"10.1109/ICCN.2015.46","DOIUrl":"https://doi.org/10.1109/ICCN.2015.46","url":null,"abstract":"Cognitive radio technology offers a revolutionary solution to spectral resources crisis by looking at the spectrum in an unconventional manner as a multi-dimensional space. The current wireless communication systems are governed by fixed spectrum assignment policy (licensed spectrum), which was proven by measurement to be inefficient. Cognitive radio enables maximum spectrum utilization efficiency through opportunistic access to temporarily unutilized portions of spectrum. In Cognitive Radio spectrum sensing performance is more important. By cooperative spectrum sensing probability of false alarm (Pf) is increased with given probability of detection (Pd). In this paper we formulate a cooperative spectrum sensing as noncooperative game and also formulate a optimization problem, numerical results demonstrate that limited number of SU for cooperative sensing are achieve much better performance than Nash Equilibrium. By selecting optimal strategy SU maximize their utility, maximum spectrum utilization is depend on expected utility under different SNR.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and analysis of a 5-pole interdigital band-pass filter at 2.4GHz 2.4GHz五极数字间带通滤波器的设计与分析
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.19
Atul Makrariya, P. Khare
In this paper we have designed and analyzed the transmission character of a 5-pole symmetrical interdigital band-pass filter centered at a frequency of 2.4GHz. Interdigital band-pass filter is designed on FR4 substrate with a substrate thickness of 1.6mm and dielectric constant, εr = 4.4. Interdigital Band pass filter is designed and simulated by Finite Element Method (FEM) based commercial software Ansoft's HFSS v13. Various transmission characteristics of band-pass filter like Fractional Bandwidth (FBW), coupling, group delay, etc., are discussed. A FBW of 59.6% is obtained at a center frequency of 2.4GHz.
本文设计并分析了一种以2.4GHz为中心的五极对称数字间带通滤波器的传输特性。在衬底厚度为1.6mm,介电常数εr = 4.4的FR4衬底上设计了数字间带通滤波器。基于商业软件Ansoft的HFSS v13,采用有限元法对数字间带通滤波器进行了设计和仿真。讨论了带通滤波器的各种传输特性,如分数带宽(FBW)、耦合、群延迟等。在2.4GHz的中心频率处得到59.6%的频宽。
{"title":"Design and analysis of a 5-pole interdigital band-pass filter at 2.4GHz","authors":"Atul Makrariya, P. Khare","doi":"10.1109/ICCN.2015.19","DOIUrl":"https://doi.org/10.1109/ICCN.2015.19","url":null,"abstract":"In this paper we have designed and analyzed the transmission character of a 5-pole symmetrical interdigital band-pass filter centered at a frequency of 2.4GHz. Interdigital band-pass filter is designed on FR4 substrate with a substrate thickness of 1.6mm and dielectric constant, εr = 4.4. Interdigital Band pass filter is designed and simulated by Finite Element Method (FEM) based commercial software Ansoft's HFSS v13. Various transmission characteristics of band-pass filter like Fractional Bandwidth (FBW), coupling, group delay, etc., are discussed. A FBW of 59.6% is obtained at a center frequency of 2.4GHz.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116824166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MITE: Memory integrity based trust evaluation in Wireless Sensor Networks 基于内存完整性的无线传感器网络信任评估
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.40
S. Desai, M. Nene
Trust is quintessential to safety in a network and is the epitome of security. Trust management schemes have been researched and implemented in Wireless Sensor Networks (WSNs) to provide an added advantage over and above the cryptographic security mechanisms. Each trust management scheme deals with the concept of trust and its evaluation in a unique manner. This uniqueness in approach is achieved by using network parameters, QoS, behavior of nodes etc. as metrics to evaluate trust. Every trust management scheme aims at providing resilience to the effect of malicious or selfish nodes. In this paper, we propose a node memory based trust evaluation method by using memory integrity as a metric to evaluate trust. The results indicate the method to be promising to evaluate trust at node-level and network-level.
信任是网络安全的精髓,是安全的缩影。在无线传感器网络(WSNs)中研究并实现了信任管理方案,以提供超越加密安全机制的额外优势。每个信任管理方案都以独特的方式处理信任的概念及其评估。这种方法的唯一性是通过使用网络参数、QoS、节点行为等作为评估信任的指标来实现的。每一种信任管理方案都旨在提供抵御恶意或自私节点影响的弹性。本文提出了一种基于节点记忆的信任评估方法,以记忆完整性作为评估信任的度量。结果表明,该方法可用于节点级和网络级的信任评估。
{"title":"MITE: Memory integrity based trust evaluation in Wireless Sensor Networks","authors":"S. Desai, M. Nene","doi":"10.1109/ICCN.2015.40","DOIUrl":"https://doi.org/10.1109/ICCN.2015.40","url":null,"abstract":"Trust is quintessential to safety in a network and is the epitome of security. Trust management schemes have been researched and implemented in Wireless Sensor Networks (WSNs) to provide an added advantage over and above the cryptographic security mechanisms. Each trust management scheme deals with the concept of trust and its evaluation in a unique manner. This uniqueness in approach is achieved by using network parameters, QoS, behavior of nodes etc. as metrics to evaluate trust. Every trust management scheme aims at providing resilience to the effect of malicious or selfish nodes. In this paper, we propose a node memory based trust evaluation method by using memory integrity as a metric to evaluate trust. The results indicate the method to be promising to evaluate trust at node-level and network-level.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and deployment of Vehicle Tracking System in VANETs using Xbee Pro: Prototype model 基于Xbee Pro的VANETs车辆跟踪系统的设计与部署:原型模型
Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.20
Nagarjuna Karyemsetty, B. Samatha, K. H. Rao
Cooperative and Communication applications place an vital role in vehicular adhoc network(VANET)s for safety messages, warning messages, weather information, Traffic congestion information and road conditions information etc can be communicated from one vehicle node to another vehicle node and vehicle node to road side unit (RSU) within the ITS (Intelligent Transportation Systems). In this paper, we conducted an experimental study to establish a simple network among five vehicle nodes. Design of each vehicle node composed of communication module, Processing module, GPS module and energy source. Each vehicle node transmits its position information along with speed of the vehicle to RSU in which we can trace the movements of vehicle that mean we can monitor the travel path of vehicle in Google map using latitude and longitude transmitted by GPS Receiver. Experiment results proved that the degradation of network performance using zigbee module in dynamic and high speed environment.
协作和通信应用在车辆专用网络(VANET)中发挥着至关重要的作用,因为安全信息、警告信息、天气信息、交通拥堵信息和路况信息等可以从一个车辆节点传输到另一个车辆节点,并在ITS(智能交通系统)中从车辆节点传输到路侧单元(RSU)。在本文中,我们进行了一个实验研究,以建立一个简单的网络之间的五个车辆节点。每个车载节点设计由通信模块、处理模块、GPS模块和能源模块组成。每个车辆节点将自己的位置信息和车辆的速度一起传输给RSU,通过RSU我们可以跟踪车辆的运动,这意味着我们可以利用GPS接收器传输的经纬度在谷歌地图上监控车辆的行驶路径。实验结果证明了zigbee模块在动态高速环境下对网络性能的影响。
{"title":"Design and deployment of Vehicle Tracking System in VANETs using Xbee Pro: Prototype model","authors":"Nagarjuna Karyemsetty, B. Samatha, K. H. Rao","doi":"10.1109/ICCN.2015.20","DOIUrl":"https://doi.org/10.1109/ICCN.2015.20","url":null,"abstract":"Cooperative and Communication applications place an vital role in vehicular adhoc network(VANET)s for safety messages, warning messages, weather information, Traffic congestion information and road conditions information etc can be communicated from one vehicle node to another vehicle node and vehicle node to road side unit (RSU) within the ITS (Intelligent Transportation Systems). In this paper, we conducted an experimental study to establish a simple network among five vehicle nodes. Design of each vehicle node composed of communication module, Processing module, GPS module and energy source. Each vehicle node transmits its position information along with speed of the vehicle to RSU in which we can trace the movements of vehicle that mean we can monitor the travel path of vehicle in Google map using latitude and longitude transmitted by GPS Receiver. Experiment results proved that the degradation of network performance using zigbee module in dynamic and high speed environment.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122948037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2015 International Conference on Communication Networks (ICCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1